Network Infrastructure Data Center Interconnects 101 Sponsored by XO Communications A DCI lets companies link two or more data centers together for disaster recovery or business continuity, but it's not easy. This report provides an overview of the major DCI technologies and describes their pros and cons. Benefits of Software-Defined Networking (SDN) Sponsored by NEC Have your engineers caught software-defined networking fever yet? While SDN is currently most appropriate for test labs or tech-savvy cloud operators like Google and Facebook, that's poised to change. As the technology matures and products proliferate, enterprise IT executives need a grasp of the potential benefits. Security Security - What Every DBA Should Know Sponsored by IBM In this Dark Reading report we examine what DBAs should know about security, as well as recommend how database and security pros can work more effectively together.
Mobile Security Mgmt in Small & Midsize Businesses Sponsored by Symantec In this Dark Reading report, we examine mobile security risks that are unique to SMBs and provide recommendations for tackling the problems. A Data Breach Bonanza Sponsored by Vormetric Cyber attackers of all types - financially motivated, nation-state spies and hacktivists - continue to hammer away at their targets en masse, and once in a while, they get caught. In this special compendium of recent Dark Reading coverage, we offer a look at some of the most recent breaches, including how they happened and how they affected the victims. Insecurity with Java Sponsored by Imperva In the wake of a zero-day vulnerability being exploited by multiple active attacks, IT teams wait for Oracle to respond. Again. Here's how to keep your systems safe, but meanwhile, start considering: Does Java's popularity as an attack vector vs. its diminishing functionality make permanently disabling plug-ins a smart idea? 10 Emerging Threats Your Company May Not Know About Sponsored by HP The devil you know is better than the one you don't. Never was that adage more true than in today's complex, ever-changing computing landscape. Unfortunately, new (and sometimes renewed) security threats are rising every day, putting IT and security pros in a defensive posture. In this Dark Reading report, we examine 10 emerging threats that you should have on your radar now. Risk Assessment & Prioritizing Vulnerability Remediation Sponsored by Lumension Vulnerability remediation is a never-ending process, but, even so, security pros can't plug every hole in every asset and application. In this report we recommend the steps that should be taken to determine the risk of vulnerabilities and the lengths to which remediation can and should go.
InformationWeek Reports is brought to you by HP, Imperva, Lumension, NEC, Schneider Electric, Symantec, Vormetric, XO Communications and UBM Tech. You are receiving this newsletter because you have previously downloaded a report from the InformationWeek Reports site. You are subscribed as sojo.blo@gmail.com. If you would like to be removed from the newsletter. If you received this newsletter from a friend and want to join. Read about and join other InformationWeek Newsletters here. UBM Tech | 600 Community Drive | Manhasset, NY 11030 | Privacy Policy
| |